12,712
13K
Feb 6, 2014
02/14
by
Richard Harman
movies
eye 12,712
favorite 7
comment 0
Controlling USB Flash Drive Controllers: Expose of Hidden Features Richard Harman With stories of "BadBIOS" infecting PCs simply by connecting a malicious USB flash drive to a PC, it's time we learned about flash drives and their controllers. Consumer USB flash drives are cheap, growing in capacity and shrinking in physical size. There are only around 15 prominent controller chip manufacturers whom you have never heard of, but OEM for all the popular and respected "name...
838
838
Feb 6, 2014
02/14
by
Lee Harrison and Kang Li
movies
eye 838
favorite 0
comment 0
Arms Race: The Story of (In)-Secure Bootloaders Lee Harrison and Kang Li Secure boot is the process that ensures the critical parts of software (e.g. kernel) running on a device are authorized and have not been tampered with. Many wireless service providers prefer to have a locked down version of their smartphones that can only boot the official kernel, and do not allow loading customized systems developed by users. This results in an arms race between the smartphone vendors and the users that...
477
477
Feb 6, 2014
02/14
by
Jake Williams and Alissa Torres
movies
eye 477
favorite 0
comment 0
ADD -- Complicating Memory Forensics Through Memory Disarray Jake Williams and Alissa Torres In this presentation, we'll present ADD (attention deficit disorder), a tool that litters Windows physical memory with (configurable amounts and types of) garbage to disrupt memory forensics. Memory forensics has become so mainstream that it's catching too many malware authors during routine investigations (making Jake a sad panda). If memory forensics were much harder to perform, then attackers would...
390
390
Feb 6, 2014
02/14
by
Paulo Shakarian
movies
eye 390
favorite 0
comment 0
The "Science of Cyber" and the Next Generation of Security Tools Paulo Shakarian Governments around the world are investing heavily in the so called "science of cyber" in order to create a rigorous scientific base for the next generation of security tools. But what's going on in the walled-off world of academia? Will this new science eventually lead to more improved security in cyber space? In this talk, I will describe three ongoing projects at West Point in collaboration...
168
168
Feb 6, 2014
02/14
by
Shmoocon Organizers and Friends
movies
eye 168
favorite 0
comment 0
Closing ceremonies for ShmooCon 2014, including organizer statements, contest results, calls for volunteers and assistance, overview of the con's performance, and highlights from the events of the weekend.
340
340
Feb 6, 2014
02/14
by
Ryan Lackey
movies
eye 340
favorite 0
comment 0
Genuinely "Trusted Computing:" Free and Open Hardware Security Modules Ryan Lackey "Trusted Computing" unfortunately often means trusting a black box provided by a third party who may not be particularly trustworthy. We present an alternative -- a user assembled hardware security module, based on a published design, using simple components which can be fully inspected by the user prior to assembly and commissioning. Ryan Lackey has 20 years of experience computer security,...
197
197
Feb 6, 2014
02/14
by
Tarah Wheeler Van Vlack and Liz Dahlstrom
movies
eye 197
favorite 0
comment 0
Syncing Mentorship Between Winners And Beginners Tarah Wheeler Van Vlack and Liz Dahlstrom Mentorship in technology is broken. Many minorities feel unwelcome in tech. The number of women in technology is actually decreasing. The only solution which is proven to increase positive outcomes is mentorship. Unfortunately, winners in tech either don't realize their help is needed or don't know how to get started. Beginners are often afraid to ask for help or don't know where to find it. We at Hack...
506
506
Feb 6, 2014
02/14
by
Jaime Sanchez and Pablo San Emeterio
movies
eye 506
favorite 0
comment 0
Malicious Threats, Vulnerabilities, and Defenses in WhatsApp and Mobile Instant Messaging Platforms Jaime Sanchez and Pablo San Emeterio Global surveillance emerged as a phenomenon since the late 1940s and Internet and mobile technology are being developed with such pace that it is impossible to guarantee electronic privacy and nobody should expect it. How strong are the actual Instant Messaging Platforms? Do they take care of our security and privacy? We'll look inside the security of several...
253
253
Feb 6, 2014
02/14
by
Shannon Brown
movies
eye 253
favorite 0
comment 0
Technology Law Issues for Security Professionals Shannon Brown An emerging gap exists between the demands of today's technology systems, the necessity for computer security research, and the reality of the law. The potential tension between these elements poses a challenge especially for computer security researchers--some who might be misunderstood or who may unintentionally run afoul a myriad of complex laws with potentially breathtaking penalties. In plain language, this presentation raises...
188
188
Feb 6, 2014
02/14
by
Davi Ottenheimer and Allison Miller
movies
eye 188
favorite 0
comment 0
Data Whales and Troll Tears: Beat the Odds in InfoSec Davi Ottenheimer and Allison Miller The rising scale and complexity of IT is creating ever more opportunities for abuse and attack. Many for years have warned we face a losing race if we rely on patch and mend. Others for years have advocated using a threat-based priority system. Is there room to consider a middle path or can we prove with science the existence of a third wave? This data-intensive presentation highlights real-world examples...
703
703
Feb 6, 2014
02/14
by
Benjamin Gatti
movies
eye 703
favorite 0
comment 0
"How I Met Your Mother" or The Brief and Secret History of Bletchley Park and How They Invented Cryptography and the Computer Age Benjamin Gatti In the darkest days of WWII, a small team assembled at Bletchley Park solved two problems and set a new course for computers and cryptography - fast computers, and secure communications can both be traced back to one of the ugliest estates in London suburbia, where Alan Turing, Max Newman, Tommy Flowers, and others hacked their way through...
1,513
1.5K
Feb 6, 2014
02/14
by
Christopher Truncer, Will Schroeder, and Michael Wright
movies
eye 1,513
favorite 0
comment 0
AV Evasion With the Veil Framework Christopher Truncer, Will Schroeder, and Michael Wright As antivirus (finally) has started to slowly increase in effectiveness, more and more of the payloads used during penetration tests are being caught. While the industry as a whole has demonstrated its capabilities of bypassing AV solutions in nearly all situations, valuable assessment time is often lost. The Veil-Evasion Framework (Veil) was developed to solve this problem by offering a modular,...
204
204
Feb 6, 2014
02/14
by
Various
movies
eye 204
favorite 0
comment 0
ShmooCon FireTalks are 15 minute presentations meant to be an alternative to the traditional 30 to 90 minute conference format. Similar to 5 minute Lightning Talks, the purpose is to challenge speakers to skip the BS and instead dive right into the core of their content in a more relaxed alternative environment. Unlike Lightning Talks, which are usually performed in rapid succession, the additional time allows the speaker to follow a more traditional introduction, body, and conclusion format....
197
197
Feb 6, 2014
02/14
by
Christopher Truncer, Will Schroeder, and Michael Wright
movies
eye 197
favorite 0
comment 0
AV Evasion With the Veil Framework Christopher Truncer, Will Schroeder, and Michael Wright As antivirus (finally) has started to slowly increase in effectiveness, more and more of the payloads used during penetration tests are being caught. While the industry as a whole has demonstrated its capabilities of bypassing AV solutions in nearly all situations, valuable assessment time is often lost. The Veil-Evasion Framework (Veil) was developed to solve this problem by offering a modular,...
276
276
Feb 6, 2014
02/14
by
Sean Barnum and Aharon Chernin
movies
eye 276
favorite 0
comment 0
Operationalizing Threat Information Sharing: Beyond Policies and Platitudes Sean Barnum and Aharon Chernin Threat intelligence sharing is a hot topic of conversation today that already affects or soon will affect most of us in the infosec community. Like most hot topics this tends to generate a lot of cliched buzzworditis and well-meant but unrealistic policy. Cue the shmooballs! But what does it take to move beyond just talking about cyber threat intelligence sharing and making it an...
369
369
Feb 6, 2014
02/14
by
Joshua Schroeder and Spencer Brooks
movies
eye 369
favorite 0
comment 0
CCTV: Setup, Attack Vectors, and Laws Joshua Schroeder and Spencer Brooks Ever wonder how to setup a CCTV Digital Video Recording security system? This talk will show how to do that, as well as key factors like attack vectors and recording laws. First, we will go over basic setup on how we planned out this project and current price points for entry. This will include things to be mindful of such as camera quality, disk space and other features. In the second part, we will cover attack vectors...
337
337
Feb 6, 2014
02/14
by
Bruce Potter (moderator), Robert David Graham, Paul McMillan, Dan Tentler, and Alejandro Caceres
movies
eye 337
favorite 0
comment 0
Closing Plenary: Large Scale Network and Application Scanning Bruce Potter (moderator), Robert David Graham, Paul McMillan, Dan Tentler, and Alejandro Caceres From proff's strobe to modern day distributed network scanners, probing remote systems and applications to assess a system's security posture is a core part of our offensive and defensive tool kits. This panel discussion will examine the state of the art of network and application scanning. During the session, the entire Internet will be...
332
332
Feb 6, 2014
02/14
by
Hendrik Schmidt and Brian Butterly
movies
eye 332
favorite 0
comment 0
LTE vs. Darwin Hendrik Schmidt and Brian Butterly Whether believing in Darwin or not, the Darwin-Award states an important fact of mankind, technology and probably everything that exists: You only make certain mistakes once. For mankind this usually implies taking oneself out of the gene pool, for companies it can mean to vanish of the market and for technology, well, early death. So when looking at "Long Term Evolution," providers need to implement proposed features properly and work...
376
376
Feb 6, 2014
02/14
by
Xeno Kovah, Corey Kallenberg, and John Butterworth
movies
eye 376
favorite 1
comment 0
Timing-Based Attestation: Sexy Defense, or the Sexiest? Xeno Kovah, Corey Kallenberg, and John Butterworth What if I told you it's possible to ask a drunk person if he's drunk - and get an accurate answer, by measuring the reaction time? What if I told you it's possible to design security software under the assumption that the attacker has the same privileges as the defender, and the attacker can scribble over and modify the defender's code as much as he wants, but he'll still get caught? This...
373
373
Feb 6, 2014
02/14
by
Scott Moulton
movies
eye 373
favorite 0
comment 0
You Don't Have the Evidence Scott Moulton Forensic imaging tools have one purpose, to soundly copy every sector on a device to a destination device and report success or failure without changing data. In the last 20 years most forensic imaging tools have not progress and continue to use the same basic code for imaging a drive. When encountering damage many of the tools have no ability to deal with the damage and quit, crash, or worse; do more damage to the drive they are trying to recover from....
382
382
Feb 6, 2014
02/14
by
Ian Goldberg
movies
eye 382
favorite 0
comment 0
Keynote Address: Privacy Online: What Now? Ian Goldberg Recent revelations about data and metadata collection of Internet users' communications have been extremely worrying. Not only are governments collecting this information, but online service providers, including cloud providers, are part of the picture as well. What can we, as individuals, do to limit the collection of our online messages, friends lists, and usage patterns? In this talk, we will look at existing and upcoming privacy...
331
331
Feb 6, 2014
02/14
by
Bruce and Heidi Potter
movies
eye 331
favorite 0
comment 0
ShmooCon 2014 - Opening Remarks Rumblings and Rants
360
360
Feb 6, 2014
02/14
by
Dominic Spill and Michael Ossmann
movies
eye 360
favorite 0
comment 0
Unambiguous Encapsulation - Separating Data and Signaling Dominic Spill and Michael Ossmann Attacks against in band signaling systems have been demonstrated against Zigbee and Ethernet in the past few years. In many ways these are similar to memory corruption attacks as both rely on data being interpreted as meta-data by the target system. We have built tools to generate sets of error correcting codes that can be used to prevent untrusted user supplied data from being interpreted as meta-data...
242
242
Feb 6, 2014
02/14
by
Branden Miller (f0zzie) and Emily Miller (ch1cken)
movies
eye 242
favorite 0
comment 0
How Hackers for Charity (Possibly) Saved Me a Lot of Money Branden Miller (f0zzie) and Emily Miller (ch1cken) What do you do when your oldest child tells you she wants to be an artist? If you are me you panic under the weight of the idea that you will be supporting your kid for life! Then you use her determination to help others as a motivator and gently (re)focus her onto technology. After 20 years in the Navy, f0zzie became a Senior Security Analyst in the Healthcare industry. He is a family...
1,383
1.4K
Feb 6, 2014
02/14
by
Dominic Spill
movies
eye 1,383
favorite 0
comment 0
An Open and Affordable USB Man in the Middle Device Dominic Spill With the introduction of FaceDancer, there has been a surge of interest in USB security. USBProxy is an open framework for the BeagleBone Black to make it simpler for anyone to monitor, inject or modify data carried over a USB connection. While the FaceDancer will allow devices to be written on a host system, we are able to go further and man-in-the-middle connections to existing devices as well. The BeagleBone Black also enables...
414
414
Feb 6, 2014
02/14
by
Mike Walker
movies
eye 414
favorite 0
comment 0
Introducing DARPA's Cyber Grand Challenge Mike Walker Could a purpose-built supercomputer play DEFCON capture the flag? Mike Walker joined DARPA as a Program Manager in January 2013. His research interests relate to machine reasoning about software in situ and the automation of application security lifecycles. Mr. Walker has extensive industry experience. Prior to joining DARPA he worked as a security software developer, enterprise security architect, and research lab leader.
487
487
Feb 6, 2014
02/14
by
Aaron Beuhring and Kyle Salous
movies
eye 487
favorite 0
comment 0
Raising Costs for Your Attackers Instead of Your CFO Aaron Beuhring and Kyle Salous Everyone knows that blacklisting is not effective and that whitelisting is a better solution, so why isn't anyone doing it? Organizations continue to spend money on the latest technologies in hopes that if they spend enough they will somehow become secure. Chances are that that these same organizations already own technology that can provide far more powerful defense than new blinking boxes but just haven't...
200
200
Feb 6, 2014
02/14
by
Joshua Franklin, Robert Tarlecki, Matthew Jablonski, and Dr. Damon McCoy
movies
eye 200
favorite 0
comment 0
Malicious Online Activities Related to the 2012 U.S. General Election Joshua Franklin, Robert Tarlecki, Matthew Jablonski, and Dr. Damon McCoy This presentation looks back at the number of ways that the 2012 Presidential election was bought, sold, and manipulated through malicious online activities. We identify activities that could be classified as manipulative, mischievous, or downright illegal, such as fake campaign donation sites, political spam, attempts to sell ballots, privacy...
918
918
Feb 6, 2014
02/14
by
Rob "Mubix" Fuller
movies
eye 918
favorite 0
comment 0
Attacker Ghost Stories: Mostly Free Defenses That Give Attackers Nightmares Rob "Mubix" Fuller This talk is about protections, mitigations, or detection mechanisms that I’ve seen across businesses big and small that were innovative and highly effective, yet free (or mostly free) and stopped me (as an attacker) dead in my tracks. We will be going over 11 (or a many as we can get to) methods, tactics, and software setups that will cut down intrusions significantly. Changes that you...
654
654
Feb 6, 2014
02/14
by
Daniel A. Mayer
movies
eye 654
favorite 1
comment 0
Introducing idb - Simplified Blackbox iOS App Pentesting Daniel A. Mayer More than ever, mobile apps are used to manage and store sensitive data by both corporations and individuals. In this talk, we review common iOS mobile app flaws involving data storage, inter-process communication, network communications, and user input handling as seen in real-world applications. To assist the community in assessing security risks of mobile apps, we introduce a new tool called 'idb' and show how it can be...
950
950
Feb 6, 2014
02/14
by
Daniel J. Bernstein and Tanja Lange
movies
eye 950
favorite 0
comment 0
SafeCurves: Choosing Safe Curves for Elliptic-Curve Cryptography Daniel J. Bernstein and Tanja Lange There are several different standards covering selection of curves for use in elliptic-curve cryptography (ECC). Each of these standards tries to ensure that the elliptic-curve discrete-logarithm problem (ECDLP) is difficult. ECDLP is the problem of finding an ECC user's secret key, given the user's public key. Unfortunately, there is a gap between ECDLP difficulty and ECC security. None of...
724
724
Feb 6, 2014
02/14
by
Courtney Lancaster
movies
eye 724
favorite 0
comment 0
Vehicle Forensics - The Data Beyond the Dashboard Courtney Lancaster With vehicle technologies constantly evolving, it is important to understand the threat to the consumer that leaves personal data behind, as well as the benefit to the investigator and how accessible this data can be. Infotainment systems are being rolled out into almost every new vehicle that is manufactured today. The art of mastering the hard drive, as well as a multitude of other components, has already occurred. Now,...
383
383
Feb 6, 2014
02/14
by
Mike Sconzo and Brian Wylie
movies
eye 383
favorite 1
comment 0
Practical Applications of Data Science in Detection Mike Sconzo and Brian Wylie It seems recently offensive tactics, exploits and vulnerabilities are getting all the Info Sec sexy-points. We're going to try and swing this back towards detection as we apply some new-fangled math and techniques to solve some existing problems and tackling new ones. We'll take Data Science off its pedestal and show how, with problem and data understanding you can apply different techniques to make analysis more...
689
689
Feb 6, 2014
02/14
by
Bruce Schneier
movies
eye 689
favorite 1
comment 0
The NSA: Capabilities and Countermeasures Bruce Schneier Edward Snowden has given us an unprecedented window into the NSA's surveillance activities. Drawing from both the Snowden documents and revelations from previous whistleblowers, I will describe the sorts of surveillance the NSA does and how it does it. The emphasis is on the technical capabilities of the NSA, not the politics of their actions. This includes how it conducts Internet surveillance on the backbone, but is primarily focused on...
240
240
Feb 6, 2014
02/14
by
Weasel
movies
eye 240
favorite 0
comment 0
Dissipation of Hackers in the Enterprise Weasel From the early days of the InfoSec industry to today there has been a constant seeping of deep-knowledge technologists into a slew of disciplines that are not primarily focused on the protection of enterprise assets. This dialog will explore and question the contributors to the diminishing attractiveness of the enterprise as a logical career path for hackers. We will go over data that shows that shift from enterprises being a primary employer for...
216
216
texts
eye 216
favorite 0
comment 0
Shmoo 2014 Vids List.
Topics: tracker, video, data, hackers, cryptography, forensics, defenses, usb, kang, miller, video...
299
299
Feb 6, 2014
02/14
by
David Giametta and Andrew Potter
movies
eye 299
favorite 0
comment 0
A Critical Review of Spatial Analysis David Giametta and Andrew Potter Spatial Analysis is a recently proposed idea of using static analysis based byte sequences characterized by statistical features fused and graphed into 2-D grids where new exploitable information is obtained. The new information is the spatial structure similarity of byte sequences located with files believed to be similar and related. The structure is generated using simple fixed size sliding windows moving along the byte...
242
242
Feb 6, 2014
02/14
by
Various
movies
eye 242
favorite 0
comment 0
ShmooCon FireTalks are 15 minute presentations meant to be an alternative to the traditional 30 to 90 minute conference format. Similar to 5 minute Lightning Talks, the purpose is to challenge speakers to skip the BS and instead dive right into the core of their content in a more relaxed alternative environment. Unlike Lightning Talks, which are usually performed in rapid succession, the additional time allows the speaker to follow a more traditional introduction, body, and conclusion format....
216
216
Feb 6, 2014
02/14
by
The Shmoo Group
movies
eye 216
favorite 0
comment 0
0wn the Con The Shmoo Group For ten years we've chosen to stand up and share all the ins and outs and inner workings of the con. Why stop now? Join us to get the break down of budget, an insight to the CFP process, a breakdown of the hours it takes to put on a con like ShmooCon and anything thing else you might want to talk about. This is an informative, fast paced and generally fun session as Bruce dances on stage, and Heidi tries to hide from the mic. Seriously though--if you ever wanted to...
664
664
Feb 6, 2014
02/14
by
Nicholas Popovich
movies
eye 664
favorite 0
comment 0
I Found a Thing and You Can (Should) Too: ISP's Unauthenticated SOAP Service = Find (Almost) All The Things! Nicholas Popovich This presentation is meant to encourage individuals to put the applications and software that they may use on their own home or small business networks under the research microscope. This will be a discussion of a recent independent research project that eventually led to an information disclosure vulnerability by a major U.S. ISP. This is also an example of when a...
286
286
Feb 6, 2014
02/14
by
Josh "m0nk" Thomas
movies
eye 286
favorite 0
comment 0
How to Train your Snapdragon: Exploring Power Frameworks on Android Josh "m0nk" Thomas Have you ever wondered how power is routed around your phone, how it is stored and if it could be made dangerous? I have, and I somehow talked the DARPA Cyber Fast Track group into funding my research into the subject and allowing me to name it: "Project Burner: El Telefono Inteligente de Fuego." The overall goal of the project was: "Can I catch a phone on fire using nothing but the...
397
397
Feb 6, 2014
02/14
by
Aaron Gee-Clough
movies
eye 397
favorite 1
comment 0
Security Analytics: Less Hype, More Data Aaron Gee-Clough There has been a lot of talk in the industry recently about "analytics" and getting security data from non-security logs. The problem is, very few people are talking about which analysis techniques are actually useful. This talk will look at a few log types and talk through analytics techniques that can be applied to each. For each technique, I'll talk about what it assumes and how it succeeds or fails when using real-world...